Skip to main content

CVE-2024-36912: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-36912cvecve-2024-36912
Published: Thu May 30 2024 (05/30/2024, 15:29:10 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl In CoCo VMs it is possible for the untrusted host to cause set_memory_encrypted() or set_memory_decrypted() to fail such that an error is returned and the resulting memory is shared. Callers need to take care to handle these errors to avoid returning decrypted (shared) memory to the page allocator, which could lead to functional or security issues. In order to make sure callers of vmbus_establish_gpadl() and vmbus_teardown_gpadl() don't return decrypted/shared pages to allocators, add a field in struct vmbus_gpadl to keep track of the decryption status of the buffers. This will allow the callers to know if they should free or leak the pages.

AI-Powered Analysis

AILast updated: 07/03/2025, 00:43:10 UTC

Technical Analysis

CVE-2024-36912 is a high-severity vulnerability in the Linux kernel specifically affecting the Hyper-V virtual bus (vmbus) driver, which is used in virtualized environments such as Microsoft's Hyper-V. The vulnerability arises from improper handling of memory encryption status in the vmbus_gpadl (guest physical address descriptor list) mechanism. In certain CoCo (Confidential Computing) virtual machines, an untrusted host can cause failures in the set_memory_encrypted() or set_memory_decrypted() functions. These failures result in memory that remains shared and decrypted when it should not be. Because callers of vmbus_establish_gpadl() and vmbus_teardown_gpadl() did not track the decryption status of buffers, they might inadvertently return decrypted shared memory pages back to the page allocator. This can lead to serious functional and security issues, including potential exposure of sensitive data or corruption of memory contents. The patch introduced a new field in the vmbus_gpadl structure to track the decryption status, enabling callers to correctly handle memory freeing or leaking to avoid exposing decrypted shared pages. The vulnerability has a CVSS 3.1 score of 8.1, indicating high severity with network attack vector, high complexity, no privileges required, no user interaction, and impacts confidentiality, integrity, and availability. No known exploits are currently reported in the wild. This vulnerability is particularly relevant for Linux systems running as guests on Hyper-V hosts, especially those leveraging confidential computing features that rely on memory encryption to protect VM memory from the host or other VMs.

Potential Impact

For European organizations, the impact of CVE-2024-36912 can be significant, especially for enterprises and cloud providers using Linux virtual machines on Microsoft Hyper-V infrastructure with confidential computing capabilities enabled. The vulnerability could allow an untrusted or compromised Hyper-V host to cause memory encryption failures, leading to exposure of decrypted memory contents. This undermines the confidentiality guarantees of confidential computing, potentially leaking sensitive data such as cryptographic keys, personal data, or intellectual property. Integrity and availability could also be affected if corrupted or shared memory leads to functional errors or crashes in guest VMs. Organizations in sectors with strict data protection requirements, such as finance, healthcare, and government, could face compliance risks and reputational damage if sensitive data is exposed. Additionally, cloud service providers hosting Linux VMs on Hyper-V could see escalated risks of cross-tenant data leakage or VM compromise. Although exploitation requires control or influence over the host environment, insider threats or supply chain attacks targeting virtualization infrastructure could leverage this vulnerability. The lack of known exploits in the wild currently limits immediate risk, but the high severity score and potential impact warrant urgent attention.

Mitigation Recommendations

European organizations should prioritize applying the Linux kernel patches that address CVE-2024-36912 as soon as they become available. Specifically, updating to kernel versions that include the fix for tracking decrypted status in vmbus_gpadl is critical. Organizations should audit their virtualization environments to identify Linux guests running on Hyper-V hosts, particularly those using confidential computing features. Restrict and monitor access to the Hyper-V host to prevent untrusted or malicious actors from manipulating memory encryption states. Implement strict host hardening, including minimizing host access privileges and employing host-based intrusion detection systems. For cloud providers, consider isolating confidential computing workloads and employing additional encryption or attestation mechanisms to detect memory encryption failures. Regularly review and test incident response plans for virtualization infrastructure compromise scenarios. Finally, maintain up-to-date inventory and vulnerability management processes to ensure timely detection and remediation of this and related vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-30T15:25:07.067Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9828c4522896dcbe265a

Added to database: 5/21/2025, 9:08:56 AM

Last enriched: 7/3/2025, 12:43:10 AM

Last updated: 8/13/2025, 8:36:26 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats